2010 IEEE Second International Conference on Cloud Computing Technology and Science 2010
DOI: 10.1109/cloudcom.2010.90
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Evaluating Clustering Algorithm

Abstract: Security is an important issue for building and sustaining trust relationship in cloud computing and in the usage of web-based applications. Consequently, intrusion detectors that adopt allowable and disallowable concepts are used in network forensics. The disallowable policy enforcers alert on events that are known to be bad while the allowable policy enforcers monitor events that deviate from known good. Nevertheless, sophisticated cases of computer attacks often render attempts to isolate failed attacks fro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
references
References 8 publications
0
0
0
Order By: Relevance